The Minimalist Entrepreneur — skills based on The Minimalist Entrepreneur by Sahil Lavingia

v1.0.0

10 business skills from The Minimalist Entrepreneur by Sahil Lavingia. Covers the full startup journey: find community, validate ideas, build MVP, processize...

0· 132·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (business-advisor skills based on The Minimalist Entrepreneur) match the SKILL.md content. There are no unexpected dependencies, binaries, or environment variables that would be unrelated to providing business advice.
Instruction Scope
SKILL.md contains only conversational/runtime instructions for providing business guidance (community discovery, validation, MVP, etc.). It does not instruct the agent to read files, access system state, use external credentials, or exfiltrate data. The scope stays within advising the user.
Install Mechanism
No install spec or code files; instruction-only skill. Nothing is downloaded or written to disk by an installer.
Credentials
Requires no environment variables, credentials, or config paths. The lack of requested secrets is proportionate to the skill's advisory purpose.
Persistence & Privilege
always is false (default) and model invocation is allowed (normal). The skill does not request persistent system presence or modify other skills/config. No elevated privileges are requested.
Assessment
This skill is instruction-only and internally coherent for business-advice use: it asks for no credentials, installs nothing, and does not access system files. Before installing, you may want to: (1) verify the upstream repo (homepage) and MIT license attribution, (2) confirm you trust the publisher or maintainer, and (3) remember that advice here is general — consult a lawyer/accountant for legal or tax decisions. If you later see this skill request API keys or an installer, treat that as a new risk and re-check scope and proportionality.

Like a lobster shell, security has layers — review code before you run it.

latestvk970xsyr5e2gafdwwa698fwjf983tf85

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments